Annotated Bibliography On Computer Memory Hacking

902 Words2 Pages

Computer Memory Hacking
Pamela Riddle
Professor Patricia Riley
CIS 106
November 20, 2014

Technology continues to evolve exponentially. However these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine. Most of these hacks are open source and free soft wares. These hacks manipulate the firmware update option on many devices to run and install themselves. Many researchers have found out that breaking into a computer’s encrypted hard drive is very easy with the help of the right tools. A research by Princeton University revealed how low tech hackers access even the most well protected computers (Jordan Robertson 2008).
This paper details how encryption was coveted for a long time as a vital shield against hackers, but can be manipulated by altering the operations of the memory chips. This paper outlines just how vulnerable the data we store on our computers and laptops is to possible hacking. Through freezing the Dynamic Random Access Memory (DRAM) chip, which is the most frequently used memory chip in personal gadgets. Freezing DRAM makes it retain data for many hours way after the machine loses its power. This data includes the keys used to unlock encryptions. If the memory chip is not frozen the chip can lose its contents in a matter of milliseconds. Hackers can use this vulnerability to steal information which is stored in the memory through rebooting of the compromised mach...

... middle of paper ...

...lso the endorsement of the Convention on Cybercrime by over 40 countries has brought about joint effort in combating some of these challenges.
In conclusion Hackers started off as experts in programming and curious intellectuals advancing the limits of technology, but have evolved into a diverse world view. Additionally the shift from hardware onto software to the internet have boosted the increase in number of malicious hackers. With the emergence of new technologies so is the renewed efforts to combat the loopholes and help protect the public.

Reference
FBI Computer Crime Survey Report 2005
Gollmann John Wiley and Sons, Dieter1999 . Computer Security.
Jordan Robertson 2008 computer memory vulnerable to hacking
Levy, Steven 1984 Hackers : heroes of the computer revolution. Press/Doubleday, .
Yeo, Vivian. ZDNet Asia 2006 Do former black hats make good hires?

More about Annotated Bibliography On Computer Memory Hacking

Open Document